Essays about: "TOTP"
Showing result 1 - 5 of 6 essays containing the word TOTP.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE
-
3. Login hardening with Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE
-
4. Investigating Open Source Alternatives for an Electronic Identity System
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Electronic IDs enable people, companies and organizations to sign documents and authenticate online. Considering the potential losses, the security in an eID system is crucial. The eID system in Sweden today, BankID, is closed source and uses proprietary standards. READ MORE
-
5. Two-factor Authentication in Smartphones: Implementations and Attacks
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. READ MORE